OWASP Netherlands
Main Supporters Upcoming Events Past Events Resources
Date | Name | Presentation Link |
---|---|---|
April 18 2024 | API Security: OWASP API Top 10 Unlocked by Erez Yalon and Paulo Silva |
Recording |
OWASP Security Champions Guide by Cheyenne Seur |
Recording | |
How (not) to use secrets with OWASP WrongSecrets by Ben de Haan |
Recording | |
March 21 2024 | How to get Dev(Ops) teams to start adopting DevSecOps by Sebastiaan Rijnbout |
Presentation |
Cracking the API: Challenges in IoT and Modern Applications by Yianna Paris |
Presentation | |
February 15 2024 | OWASP ModSecurity: A Few Plot Twists and What Feels Like a Happy End by Christian Folini |
Recording |
OWASP Dependency-Track by Niklas Düster |
Recording | |
October 19 2023 | Hacking CI/CD Pipelines: Some use cases for hacking CI/CD orchestrators by Mauricio Cano |
Recording |
Unveiling the secrets in your code: Detecting and Triaging exposed credentials at scale by Ingmar Vis |
Recording | |
September 21 2023 | DAST in the world of DevSecOps by Amit Sharma |
Recording |
SAST, DAST, IAST... xAST de-mystified by Martin Knobloch |
Recording | |
June 7 2023 | Panel Discussion on Web Application Firewalls by Aatif Khan and Menno Swam and Nico van Rooyen |
Recording |
May 25 2023 | AppSec in IT contracts by Sebastian Avarvarei |
Recording |
About containers and their escapes: understanding escape patterns and possibilities by Mauricio Cano |
Recording | |
April 20 2023 | OWASP Juice Shop by Björn Kimminich |
Presentation
Recording |
The Rise of the Security Verification Standard by Josh Grossman |
Recording | |
March 16 2023 | Crash course on the OWASP API Security Top 10 by Colin Domoney |
Presentation
Recording |
January 19 2023 | Bootstrap and increase your software assurance with OWASP SAMM v2.1 by Sebastien Deleersnyder |
Presentation |
September 15 2022 | The Red Cross of the Internet by Shairesh Algoe |
Recording |
Digitally securing The Netherlands - or convincing others to do it by Koen Sandbrink |
Recording | |
June 16 2022 | Staying in control of your cloud application landscape by Priyam Awasthy and Spandan Chandra |
Presentation
Recording |
OWASP Cloud-Native Application Security Top 10 by Filip |
Presentation
Recording |
|
May 19 2022 | Comparing Static Analysis Security Testing (SAST) tools en dependency scanners by Wibren Wiersma |
Recording |
Infrastructure as Code (IaC) - security challenges and how KICS solves them by Lior Kaplan |
Recording | |
Secret Scanning Solutions by Raluca Viziteu |
Recording | |
April 21 2022 | Crawl Dutch government websites to collect statistics of SRI usage by Tom Stock |
Recording |
Web Security Map (basisbeveiliging.nl) by Elger Jonker |
Recording | |
Security Transformation Program by Dimitar Yanev and Andreas Hauke |
Recording | |
March 17 2022 | OWASP Dependency Track and OWASP CycloneDX by Steve |
Recording |
Software Bill of Material – why do we need it, what is it and how can we overcome the current challenges by Klaas Wijbrans |
Recording | |
Introducing: The Security Champions Guidebook |
Recording | |
Introducing: Guidelines on embedding SBOM in your organization |
Recording | |
February 17 2022 | How log4j became an epic - a story told by a developer and a product owner by Rick te Brake and Anna Rudenko |
Recording |
The Long-Term Impact of Log4j by Dan Cornell |
Recording | |
How log4j ruined our Christmas by Owen |
Recording | |
January 20 2022 | A story on scaling threat modeling across 500+ DevOps teams by Abhishek k. Goel |
Recording |
Gamification of Threat Modelling by Grant Ongers |
Recording | |
October 28 2021 | Our Secrets Management Journey: From Code to Vault by Jeroen Willemsen |
Recording |
Doing Security in DevOps, the right way! by Irfaan Santoe |
Recording | |
April 9 2020 | SKF news by Riccardo ten Cate and Glenn ten Cate |
Recording |
OWASP Integration Standards project update by Rob van der Veer |
Recording | |
June 18 2019 | Recon Recon by Martijn Baalman aka @x1m_martijn |
Recording |
The Good, The Bad and The Ugly of Responsible Disclosure by Chrissy Morgan aka 5w0rdFish |
Recording | |
January 17 2019 | Machine Learning vs. Cryptocoin Miners by Jonn Callahan |
Presentation
Recording |
Running at Light Speed: Cloud Native Security Patterns by Jack Mannino |
Presentation
Recording |
|
September 27 2018 | Serverless Security: Functions-as-a-Service (FaaS) by Niels Tanis |
Recording |
Building A Security Test Automation Framework by Riccardo Ten Cate |
Recording | |
June 28 2018 | Building A Security 'Culture' by Gareth O'Sullivan |
Recording |
Building Secure Software With OWASP Tools And Guides by Martin Knobloch |
Recording | |
October 12 2017 | Playing in the Sandbox: Bypassing Adobe Flash Input Validation by Björn Ruytenberg |
Recording |
How to rob a bank by Pieter Ceelen |
Recording | |
November 7 2016 | Web Security: Broken by default? by Niels Tanis |
Recording |
Building A Software Security Program by Kuai Hinojosa |
Recording | |
September 22 2016 | Handling Of Security Requirements In Software Development Lifecycle by Daniel Kefer and René Reuter |
Recording |
Hacking The OWASP Juice Shop by Björn Kimminich |
Recording | |
July 7 2016 | Find and fix software security problems… by Matias Madou |
Recording |
How To Keep Your Secrets Safe(r) On An Android Device by Jeroen Willemsen |
Recording | |
April 21 2016 | Web Application Firewall, Filter and Bypass by Aatif Khan |
Recording |
February 18 2016 | OWASP Security Knowledge Framework by Glenn Ten Cate and Riccardo Ten Cate |
Recording |